Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13109: CWE-639 Authorization Bypass Through User-Controlled Key in realmag777 HUSKY – Products Filter Professional for WooCommerce

0
Medium
VulnerabilityCVE-2025-13109cvecve-2025-13109cwe-639
Published: Wed Dec 03 2025 (12/03/2025, 12:29:56 UTC)
Source: CVE Database V5
Vendor/Project: realmag777
Product: HUSKY – Products Filter Professional for WooCommerce

Description

The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.3.7.2 via the "woof_add_query" and "woof_remove_query" functions due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with subscriber level access and above, to insert or remove arbitrary saved search queries into any user's profile, including administrators.

AI-Powered Analysis

AILast updated: 12/03/2025, 12:52:01 UTC

Technical Analysis

CVE-2025-13109 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the HUSKY – Products Filter Professional for WooCommerce plugin for WordPress. The vulnerability exists in all versions up to and including 1.3.7.2. It arises because the plugin's functions woof_add_query and woof_remove_query fail to properly validate a user-controlled key parameter. This lack of validation allows authenticated users with subscriber-level privileges or higher to manipulate saved search queries in other users' profiles, including those of administrators. Specifically, attackers can insert or remove arbitrary saved search queries, potentially altering the behavior of the plugin or the user experience without authorization. The vulnerability is remotely exploitable over the network without requiring user interaction beyond authentication. The CVSS v3.1 score is 4.3 (medium), reflecting low impact on confidentiality and availability but a partial impact on integrity. No known public exploits or patches are currently available, indicating the need for proactive mitigation. The flaw represents an insecure direct object reference (IDOR) scenario where access control checks are insufficient or missing for sensitive operations on user data within the plugin.

Potential Impact

For European organizations, this vulnerability primarily threatens the integrity of user data within WooCommerce stores using the affected plugin. Attackers with low-level authenticated access (subscriber or above) can manipulate saved search queries in other users' profiles, including administrators, potentially disrupting administrative workflows or causing confusion. While it does not directly expose sensitive data or cause denial of service, unauthorized data modification can undermine trust and operational stability. E-commerce sites relying on this plugin may face risks of subtle sabotage or manipulation of user settings, which could indirectly affect customer experience or administrative efficiency. The vulnerability could also be leveraged as a stepping stone for further attacks if combined with other flaws. Given WooCommerce's popularity in Europe, especially in countries with large e-commerce markets, the impact could be significant if exploited at scale.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit and restrict access controls within the HUSKY – Products Filter Professional plugin, ensuring that all user-controlled keys are properly validated against the authenticated user's permissions. Specifically, developers or site administrators should implement strict authorization checks in the woof_add_query and woof_remove_query functions to confirm that the user is permitted to modify the targeted saved search queries. Until an official patch is released, consider disabling or removing the plugin if it is not critical to business operations. Additionally, monitor user activity logs for unusual modifications to saved queries, especially those affecting administrator accounts. Employ the principle of least privilege by limiting subscriber-level access where possible. Regularly update WordPress and all plugins to the latest versions once patches become available. Finally, consider implementing web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting these functions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-12T23:36:07.758Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69302ef1720cedca79452381

Added to database: 12/3/2025, 12:37:05 PM

Last enriched: 12/3/2025, 12:52:01 PM

Last updated: 12/5/2025, 3:22:39 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats